共 50 条
- [22] Verifiable threshold cryptosystems based on elliptic curve 2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 334 - 337
- [24] Novel Precomputation Schemes for Elliptic Curve Cryptosystems APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 71 - 88
- [25] Exceptional procedure attack on elliptic curve cryptosystems PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 224 - 239
- [26] Differential fault attacks on elliptic curve cryptosystems ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 131 - 146
- [27] Some Ways to Secure Elliptic Curve Cryptosystems Advances in Applied Clifford Algebras, 2008, 18 : 677 - 688
- [28] Voting protocol based on elliptic curve cryptosystems Dianzi Kexue Xuekan/Journal of Electronics, 2000, 22 (01): : 84 - 89
- [29] Multi-threading elliptic curve cryptosystems ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 134 - 139
- [30] Parallel scalar multiplication for elliptic curve cryptosystems 2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 71 - 73